Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Warrior

Buy
Network Warrior, 9781449387860 (1449387861), O'Reilly, 2011

The examples used in this book are taken from my own experiences, as well as from the experiences of those with or for whom I have had the pleasure of working. Of course, for obvious legal and honorable reasons, the exact details and any information that might reveal the identities of the other parties involved have been changed.

Cisco equipment is used for the examples within this book and, with very few exceptions, the examples are TCP/IP-based. You may argue that a book of this type should include examples using different protocols and equipment from a variety of vendors, and, to a degree, that argument is valid. However, a book that aims to cover the breadth of technologies contained herein, while also attempting to show examples of these technologies from the point of view of different vendors, would be quite an impractical size. The fact is that Cisco Systems (much to the chagrin of its competitors, I’m sure) is the premier player in the networking arena. Likewise, TCP/IP is the protocol of the Internet, and the protocol used by most networked devices. Is it the best protocol for the job? Perhaps not, but it is the protocol in use today, so it’s what I’ve used in all my examples. Not long ago, the Cisco CCIE exam still included Token Ring Source Route Bridging, AppleTalk, and IPX. Those days are gone, however, indicating that even Cisco understands that TCP/IP is where everyone is heading. I have included a chapter on IPv6 in this edition, since it looks like we’re heading that way eventually.

WAN technology can include everything from dial-up modems (which, thankfully, are becoming quite rare) to T1, DS3, SONET, MPLS, and so on. We will look at many of these topics, but we will not delve too deeply into them, for they are the subject of entire books unto themselves—some of which may already sit next to this one on your O’Reilly bookshelf.

Again, all the examples used in this book are drawn from real experiences, most of which I faced myself during my career as a networking engineer, consultant, manager, and director. I have run my own company and have had the pleasure of working with some of the best people in the industry. The solutions presented in these chapters are the ones my teams and I discovered or learned about in the process of resolving the issues we encountered.

(HTML tags aren't allowed.)

The Meditator's Handbook: A Comprehensive Guide to Eastern and Western Meditation Techniques
The Meditator's Handbook: A Comprehensive Guide to Eastern and Western Meditation Techniques

A clear and authoritative introduction to the different traditions of meditation by an authority in the field. Meditation is an extraordinarily powerful tool for physical and mental relaxation as well as for personal and spiritual growth. It has been practiced for thousands of years and today it continues to have serious relevance for an...

Rates of Evolution: A Quantitative Synthesis
Rates of Evolution: A Quantitative Synthesis
How fast is evolution, and why does it matter? The rate of evolution, and whether it is gradual or punctuated, is a hotly debated topic among biologists and paleontologists. This book compiles and compares examples of evolution from laboratory, field, and fossil record studies, analyzing them to extract their underlying rates. It concludes that...
Pen-and-Paper User Interfaces: Integrating Printed and Digital Documents (Human-Computer Interaction Series)
Pen-and-Paper User Interfaces: Integrating Printed and Digital Documents (Human-Computer Interaction Series)

Even at the beginning of the 21st century, we are far from becoming paperless. Pen and paper is still the only truly ubiquitous information processing technology. Pen-and-paper user interfaces bridge the gap between paper and the digital world. Rather than replacing paper with electronic media, they seamlessly integrate both worlds in a...


UMTS Networks: Architecture, Mobility and Services
UMTS Networks: Architecture, Mobility and Services
The world's first public GSM call was made on 1st July 1991 in a city park of Helsinki, Finland. That event is now regarded as the birthday of the second generation mobile telephony. GSM has been an overwhelming success, which was difficult to predict at that early stage. In the past 10 years GSM has become a truly global...
Circuit Complexity and Neural Networks (Foundations of Computing)
Circuit Complexity and Neural Networks (Foundations of Computing)

Neural networks usually work adequately on small problems but can run into trouble when they are scaled up to problems involving large amounts of input data. Circuit Complexity and Neural Networks addresses the important question of how well neural networks scale - that is, how fast the computation time and number of neurons grow as the...

Social Marketing to the Business Customer: Listen to Your B2B Market, Generate Major Account Leads, and Build Client Relationships
Social Marketing to the Business Customer: Listen to Your B2B Market, Generate Major Account Leads, and Build Client Relationships

The first book devoted entirely to B2B social marketing

B2B markets are fundamentally different from consumer markets. Decisions are made on value, not impulse. Buying cycles are complex, often with many stakeholders involved. Relationships and support are critical. Bet-the-business decisions demand discipline, knowledge, and lots...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy